Re: How should NAT terminate ?

From: Mikael Olsson (mikael.olssonat_private)
Date: Mon Jan 10 2000 - 12:38:44 PST

  • Next message: Marcus Noveix: "Internal Database server access from DMZ host"

    Darren,
    
    For the sake of clarity, I gather that your network setup is like
    this:
    
    PC -> Firewall with OWN dialup -> POTS -> ISP -> Internet
    
    Darren Reed wrote:
    > 
    > [Modem hanging up with active NAT sessions in your local firewall]
    >
    > For at least some period of time, your old IP# may be black
    > holed, or worse, allocated to another Internet user.  The
    > second case is worse because small amounts of your web session
    > *may* leak to someone else.
    
    Well, this is true for any unencrypted data, so I don't really see
    the increased danger here. (Thinking sniffing and redirection, etc..)
    I _do_ see your point however.
    
    > Whatever the case, there is a period of time in which the original
    > endpoints believe a connection exists, which no longer does.  Should
    > a pre-emptive strike be lunched by the firewall to blow these away
    > by doing something like sending TCP RST's ?  What about for DNS/NTP
    > queries - are ICMP unreachables appropriate ?
    
    It all really depends on who does the hang up. 
    
    If your ISP terminates the connection (or line noise kills
    it), your firewall can't do much about it. 
    It COULD conceptually wait until you reconnect and then send
    out a bunch of RST's using the old IP, but chances are that your
    ISP will hate you for that.
    
    If your firewall decides to terminate the dial-up connection
    however, one could send out RSTs for all active TCP connections. 
    This is valid behaviour, and I know there are firewalls that do 
    this (send out RSTs in both directions) when they time out idle 
    TCP connections. 
    
    I don't think sending ICMP unreachables for UDP connections will
    buy you a whole lot. Most UDP based protocols don't listen a 
    whole lot to returned ICMP messages once the "connection" is 
    "established"; they use time outs instead. Heck, most don't
    even listen to ICMP messages while they "connect".
    
    In the case of DNS, sending ICMP unreachables wouldn't buy you
    anything even if the server DID listen to them. The response
    should arrive within seconds of your query, and I'd be damned
    surprised if someone manages to steal your old IP in the time.
    The server will never attempt to "resend" old responses.
    
    NFS and the like may be a different issue however, but if
    you're running NFS over unprotected lines, you're toast 
    anyway.
    
    
    'nuff ranting from me now.
    
    /Mike
    
    
    BTW, your copy of ELM has Y2K problems:
    "Date: Sat, 8 Jan 100 01:04:08 +1100 (EST)"  *ahem* :-)
                      ^^^
    
    -- 
    Mikael Olsson, EnterNet Sweden AB, Box 393, S-891 28 ÖRNSKÖLDSVIK
    Phone: +46-(0)660-105 50           Fax: +46-(0)660-122 50
    Mobile: +46-(0)70-248 00 33
    WWW: http://www.enternet.se        E-mail: mikael.olssonat_private
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:56:56 PDT